Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

500-220 Engineering Cisco Meraki Solutions (ECMS) v2.2 Questions and Answers

Questions 4

An organization requires that BYOD devices be enrolled in Systems Manager before they gain access to the network. Part of the enrollment includes pushing out the corporate SSID preshared key, corporate email settings, and some business-sensitive PDFs. When a user leaves the organization, which Systems Manager feature allows the removal of only the MDM-delivered content from the user's device?

Options:

A.

Erase Device

B.

Clear Pushed Data

C.

Unenroll Device

D.

Selective Wipe

Buy Now
Questions 5

What are two organization permission types? (Choose two.)

Options:

A.

Full

B.

Read-only

C.

Monitor-only

D.

Write

E.

Write-only

Buy Now
Questions 6

What are two roles of the network and device tags in a Dashboard? (Choose two.)

Options:

A.

Tags enable administrators to configure a combination of network and device specific tags to create summary reports filtered for specific devices across multiple networks.

B.

Network tags can be used to assign networks to separate Auto VPN domains in an Organization with many networks.

C.

Network tags can be used to simplify the assignment of network-level permissions in an Organization with many networks.

D.

Device tags can be used to simplify the assignment of device-level permissions in an Organization with many administrators.

E.

Device tags can be assigned to MR APs to influence the gateway selection for repeaters in a mesh wireless network.

Buy Now
Questions 7

When an SSID is configured with Sign-On Splash page enabled, which two settings must be configured for unauthenticated clients to have full network access and not be allow listed? (Choose two.)

Options:

A.

Controller disconnection behavior

B.

Captive Portal strength

C.

Simultaneous logins

D.

Firewall & traffic shaping

E.

RADIUS for splash page settings

Buy Now
Questions 8

Company iPads are enrolled in Systems Manager without supervision, and profiles are pushed through Systems Manager.

Which outcome occurs when a user attempts to remove the “Meraki Management” profile on an iPad?

Options:

A.

The “Meraki Management” profile cannot be removed.

B.

The “Meraki Management” profile is removed and then pushed automatically by Systems Manager.

C.

The “Meraki Management” profile is removed. All the profiles that Systems Manager pushed are also removed.

D.

The “Meraki Management” profile is removed. All the profiles Systems Manager pushed remain.

Buy Now
Questions 9

Which VLAN is used to source pings across the site-to-site VPN when using the MX Live tools?

Options:

A.

highest VLAN ID that is configured and set to NO to use VPN

B.

lowest VLAN ID that is configured and set to YES to use VPN

C.

highest VLAN ID that is configured and set to YES to use VPN

D.

lowest VLAN ID configured and set to NO to use VPN

Buy Now
Questions 10

Drag and drop the settings from the left onto the OS system or systems that support it on the right Settings can be used more than once.

Options:

Buy Now
Questions 11

What are two ways peers interact with ports that Auto VPN uses? (Choose two.)

Options:

A.

For IPsec tunneling, peers use high UDP ports within the 32768 to 61000 range.

B.

Peers contact the VPN registry at UDP port 9350.

C.

For IPsec tunneling, peers use high TCP ports within the 32768 to 61000 range.

D.

Peers contact the VPN registry at TCP port 9350.

E.

For IPsec tunneling, peers use UDP ports 500 and 4500.

Buy Now
Questions 12

Refer to the exhibit.

Which two actions are required to optimize load balancing asymmetrically with a 4:1 ratio between links? (Choose two.)

Options:

A.

Change the primary uplink to "none".

B.

Add an internet traffic preference that defines the load-balancing ratio as 4:1.

C.

Enable load balancing.

D.

Set the speed of the cellular uplink to zero.

E.

Change the assigned speeds of WAN 1 and WAN 2 so that the ratio is 4:1.

Buy Now
Questions 13

What is out of scope when considering the Best practices for high-density wireless designs?

Options:

A.

maximum beamforming

B.

band selection

C.

minimum bitrate

D.

number of SSIDs

Buy Now
Questions 14

What is the role of the Meraki Dashboard as the service provider when using SAML for single sign-on to the Dashboard?

Options:

A.

The Dashboard generates the SAML request.

B.

The Dashboard provides user access credentials.

C.

The Dashboard parses the SAML request and authenticates users.

D.

The Dashboard generates the SAML response.

Buy Now
Questions 15

Which configuration step is necessary when automatic updating is required of iOS apps provisioned through Systems Manager that are found in the App Store?

Options:

A.

No configuration step is necessary; automatic updating is the default behavior.

B.

Configure automatic updating of iOS devices in the Meraki installed profile.

C.

Create a security policy that enables automatic updates.

D.

Create a profile with automatic update enabled and apply it to iOS devices.

Buy Now
Questions 16

Refer to the exhibit.

Which IDS/IPS mode is the MX Security Appliance configured for?

Options:

A.

quarantine

B.

prevention

C.

detection

D.

blocking

Buy Now
Questions 17

A Cisco Meraki MX security appliance is trying to route a packet to the destination IP address of 172.18.24.12. Which routes contained in its routing table does it select?

Options:

A.

Auto VPN route 172.18.0.0/16

B.

static route 172.16.0.0/12

C.

non-Meraki VPN route 172.18.24.0/24

D.

directly connected 172.18.16.0/20

Buy Now
Questions 18

What are two methods of targeting and applying management profiles to System Manager clients? (Choose two.)

Options:

A.

by using Wi-Fi tags

B.

by defining the scope

C.

by defining a range of serial numbers

D.

by using device tags

E.

by using dynamic IP tags

Buy Now
Questions 19

Refer to the exhibit.

For an AP that displays this alert, which network access control method must be in use?

Options:

A.

preshared key

B.

WPA2-enterprise with my RADIUS server

C.

splash page with my RADIUS server

D.

MAC-based access control with RADIUS server

Buy Now
Questions 20

Refer to the exhibit.

Which design recommendation should be considered?

Options:

A.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

B.

A 25-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

C.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 1-hop maximum.

D.

A 50-percent throughput loss occurs for every hop. Cisco Meraki best practice recommends a 2-hop maximum.

Buy Now
Questions 21

A Cisco Meraki MV camera is monitoring an office and its field of vision currently captures work desks and employee computer screens. However, recording employee computer screens is prohibited by local regulation.

Which feature in Dashboard can be used to preserve the current position of the camera while also meeting regulation requirements?

Options:

A.

zone exclusion

B.

privacy window

C.

area or interest

D.

sensor crop

E.

restricted mode

Buy Now
Exam Code: 500-220
Exam Name: Engineering Cisco Meraki Solutions (ECMS) v2.2
Last Update: Jun 15, 2025
Questions: 72
500-220 pdf

500-220 PDF

$28.5  $94.99
500-220 Engine

500-220 Testing Engine

$33  $109.99
500-220 PDF + Engine

500-220 PDF + Testing Engine

$43.5  $144.99